Open GoogleCodeExporter opened 9 years ago
An alternate solution to this problem might be in using bully an alternative
WPS cracking program to reaver. Bully has the option to bruteforce last
checksum digit of PIN. It seems like a possible solution for this problem until
reaver incorporates this option in the command line. You can follow the 99.99%
problem in kali-linux forums as both bully and reaver are intigrated into the
kali-linux package and can be updated easily with apt-get install reaver or
apt-get install bully
Original comment by tuispl...@gmail.com
on 3 Dec 2013 at 12:08
Against our first router that showed the 99.99% problem - kali-linux using
Reaver 1.4-2kali7 cracked the code.
Original comment by tuispl...@gmail.com
on 3 Dec 2013 at 6:17
guys , pleaseee help me :(((
i install bully and do commands right !
but i get this ! :
root@Max:~# bully -b xx:xx:xx:xx:xx:xx -c 6 -T mon0
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Using '00:11:22:33:44:55' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '60:a4:4c:ee:cd:a4' on channel '6'
[!] Excessive (3) FCS failures while reading next packet
[!] Excessive (3) FCS failures while reading next packet
[!] Excessive (3) FCS failures while reading next packet
[!] Disabling FCS validation (assuming --nofcs)
[+] Got beacon for 'milk' (xx:xx:xx:xx:xx:xx)
[X] The AP doesn't appear to be WPS enabled (no WPS IE)
Help me :(
Original comment by pooya.si...@gmail.com
on 29 Sep 2014 at 4:58
Original issue reported on code.google.com by
tuispl...@gmail.com
on 29 Nov 2013 at 8:41